Aug. 26, 2023, 5:35 a.m. | /u/G_Force1

cybersecurity www.reddit.com

I'm evaluating moving to Passwordless and my company is using BYOD.
This will change my attack surface.
I'm trying to brainstorm all the possible attack vectors how someone could compromise a mobile and gain access to the authenticator app on the mobile, so I can come up with compensating and mitigating controls.
I looked at the MITRE ATT&CK mobile matrix and it only had 4 initial attack vectors, but it feels there would be many more attack vectors that a …

access app attack attack surface attack vectors authenticator authenticator app byod change compromise compromised cybersecurity device mobile mobile device moving passwordless

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States